Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/165204
Title: | A practical man-in-the-middle attack on deep learning edge device by sparse light strip injection into camera data lane | Authors: | Liu, Wenye He, Weiyang Hu, Bowen Chang, Chip-Hong |
Keywords: | Engineering::Computer science and engineering::Hardware::Input/output and data communications Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
Issue Date: | 2022 | Source: | Liu, W., He, W., Hu, B. & Chang, C. (2022). A practical man-in-the-middle attack on deep learning edge device by sparse light strip injection into camera data lane. 2022 IEEE 35th International System-on-Chip Conference (SOCC), 2022-September, 1-6. https://dx.doi.org/10.1109/SOCC56010.2022.9908112 | Project: | CHFA-GC1- AW01 | Conference: | 2022 IEEE 35th International System-on-Chip Conference (SOCC) | Abstract: | The vulnerability of deep neural networks (DNNs) has been exposed by adversarial examples. Although the adversarial perturbations can be made visually imperceptible or photorealistic on any image, they have to be added offline on pre-captured static input in order to accomplish the malicious goal. As opposed to subtle distortion, real-time misclassification on streaming images can be realized by manipulating the objects in physical world. Recently, object-contactless physical attacks, as exemplified by a translucent sticker affixed to the lens of a camera, show that a sensor-enabled edge computing platform can be an alluring target of adversarial attack. Nevertheless, success rates of reported camera-based patch attacks are not high enough to overshadow other forms of evasion attacks even when they are performed under the white-box scenario. In this paper, we present a practical and robust fault injection approach cooperated with a hardware-friendly sparse strip pattern to deceive the deployed DNN device on real-time streaming images. The strip perturbation is generated in a line-offset form by an optimization algorithm. It can be injected into camera data lane between the image sensor and the endpoint node stealthily without disturbing the data traffic through an interface bridge implemented by a tiny off-the-shelf FPGA device. We demonstrate our attack on the Raspberry Pi 4 platform with the Pi camera v2 and the Intel NCS2 inference stick. By evaluating 280 physically captured images from ten objects in 28 viewing angles, we show that the proposed attack on four ImageNet models including ResNet50, MobileNet-v2, Inception-v3 and EfficientNet-B0 can achieve 89.2% ∼ 96.1% success rates. | URI: | https://hdl.handle.net/10356/165204 | ISBN: | 978-1-6654-5985-3 | DOI: | 10.1109/SOCC56010.2022.9908112 | Schools: | School of Electrical and Electronic Engineering | Research Centres: | VIRTUS, IC Design Centre of Excellence | Rights: | © 2022 IEEE. All rights reserved. This paper was published in the Proceedings of 2022 IEEE 35th International System-on-Chip Conference (SOCC) and is made available with permission of IEEE. | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | EEE Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
m11568-liu final.pdf | 1.12 MB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
50
5
Updated on Mar 13, 2025
Page view(s)
206
Updated on Mar 16, 2025
Download(s) 50
153
Updated on Mar 16, 2025
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.